
Sign up to save your podcasts
Or


Privacy and Accuracy-Aware AI/ML Model Deduplication
Quantitative Resilience Modeling for Autonomous Cyber Defense
ESSPI: ECDSA/Schnorr Signed Program Input for BitVMX
Optimisation of cyber insurance coverage with selection of cost
RedChronos: A Large Language Model-Based Log Analysis System for Insider
Unclonable Encryption with Continuous Variables
LLM-Safety Evaluations Lack Robustness
TFHE-SBC: Software Designs for Fully Homomorphic Encryption over the
Attack Tree Distance: a practical examination of tree difference
Privacy Preservation Techniques (PPTs) in IoT Systems: A Scoping Review
Through the Static: Demystifying Malware Visualization via
PANTHER: Pluginizable Testing Environment for Network Protocols
Trace of the Times: Rootkit Detection through Temporal Anomalies in
A Kolmogorov-Arnold Network for Explainable Detection of Cyberattacks on
Client-Aided Secure Two-Party Computation of Dynamic Controllers
DDAD: A Two-pronged Adversarial Defense Based on Distributional
Malware Classification from Memory Dumps Using Machine Learning,
Network Traffic Classification Using Machine Learning, Transformer, and
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuPrivacy and Accuracy-Aware AI/ML Model Deduplication
Quantitative Resilience Modeling for Autonomous Cyber Defense
ESSPI: ECDSA/Schnorr Signed Program Input for BitVMX
Optimisation of cyber insurance coverage with selection of cost
RedChronos: A Large Language Model-Based Log Analysis System for Insider
Unclonable Encryption with Continuous Variables
LLM-Safety Evaluations Lack Robustness
TFHE-SBC: Software Designs for Fully Homomorphic Encryption over the
Attack Tree Distance: a practical examination of tree difference
Privacy Preservation Techniques (PPTs) in IoT Systems: A Scoping Review
Through the Static: Demystifying Malware Visualization via
PANTHER: Pluginizable Testing Environment for Network Protocols
Trace of the Times: Rootkit Detection through Temporal Anomalies in
A Kolmogorov-Arnold Network for Explainable Detection of Cyberattacks on
Client-Aided Secure Two-Party Computation of Dynamic Controllers
DDAD: A Two-pronged Adversarial Defense Based on Distributional
Malware Classification from Memory Dumps Using Machine Learning,
Network Traffic Classification Using Machine Learning, Transformer, and
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>